Configuring Port-Based and Client-Based Access Control (802.1X)
Configuring Switch Ports To Operate As Supplicants for 802.1X Connections to Other Switches
Supplicant Port Configuration
Enabling a Switch Port as a Supplicant.
You can configure a switch port
as a supplicant for a point-to-point link to an 802.1X-aware port on another
switch.
Configure the port as a supplicant before configuring any suppli-
cant-related parameters.
Syntax:
[no] aaa port-access supplicant [ethernet] <
port-list
>
Configures a port as a supplicant with either the default supp-
licant settings or any previously configured supplicant set-
tings, whichever is most recent. The “
no
” form of the command
disables supplicant operation on the specified ports.
Configuring a Supplicant Switch Port.
You must enable supplicant oper
ation on a port before changing the supplicant configuration. This means you
must execute the supplicant command once without any other parameters,
then execute it again with a supplicant parameter you want to configure. If
the intended authenticator port uses RADIUS authentication, then use the
identity
and
secret
options to configure the RADIUS-expected credentials on
the supplicant port. If the intended authenticator port uses Local 802.1X
authentication, then use the
identity
and
secret
options to configure the
authenticator switch’s local username and password on the supplicant port.
Syntax:
aaa port-access supplicant [ethernet] <
port-list
>
To enable supplicant operation on the designated ports,
execute this command without any other parameters.
After doing this, you can use the command again with the
following parameters to configure supplicant opertion.
(Use one instance of the command for each parameter you
want to configure The
no
form disables supplicant opera-
tion on the designated port(s).
[identity <
username
>]
Sets the username and password to pass to the authenti-
cator port when a challenge-request packet is received from
the authenticator port due to an authentication request. If
the intended authenticator port is configured for RADIUS
authentication, then
< username >
and
< password >
must
be the username and password expected by the RADIUS
server. If the intended authenticator port is configured for
Local authentication, then
< username >
and
< password >
must be the username and password configured on the
Authenticator switch. (Default: Null.)
10-44
Содержание J8697A
Страница 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Страница 2: ......
Страница 22: ...Product Documentation Feature Index xx ...
Страница 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Страница 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Страница 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Страница 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Страница 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Страница 230: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup This page is intentionally unused 8 22 ...
Страница 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Страница 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Страница 388: ...10 Index ...
Страница 389: ......